A new activity from Webworm, a China-aligned advanced persistent threat (APT) group, revealing a significant evolution in its cyber espionage toolkit during 2025. The group, first publicly documented in 2022, has shifted its targeting from primarily Asian organizations to government entities across Europe, while adopting stealthier techniques and cloud-based command-and-control (C2) infrastructure. One of the […]
The post GraphWorm Malware Abuses Microsoft OneDrive for Stealthy C2 Operations appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The Compliance Bottleneck in Connected Health: Why Cloud-Based Medical Devices Need a Different V&V Approach
Heena Purkait, Senior Engineering Project Manager at Fresenius Medical Care Most verification and validation (V&V) frameworks in medical devices were built on a foundational assumption:


